Abstract
In t-out-of-n oblivious transfer (OT), the receiver can only receive t messages out of n messages sent by the sender, and the sender has no idea about which ones have been received. Majority of the existence of previous efficient OT schemes require t calls of 1-out-of-n OT to construct the t-out-of-n OT. Its computational requirements and bandwidth consumption are quite demanding. On the basis of the elliptic curves cryptography, we propose a new t-out-of-n OT protocol for private information retrieval in this article. It is more suitable for the smart cards or mobile units.
| Original language | English |
|---|---|
| Pages (from-to) | 3759-3767 |
| Number of pages | 9 |
| Journal | International Journal of Communication Systems |
| Volume | 27 |
| Issue number | 12 |
| DOIs | |
| State | Published - 01 12 2014 |
Bibliographical note
Publisher Copyright:Copyright © 2013 John Wiley & Sons, Ltd.
Keywords
- Cloud
- ECC
- Oblivious transfer
- Private information retrieval
- Security
Fingerprint
Dive into the research topics of 'An efficient t-out-of-n oblivious transfer for information security and privacy protection'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver